General

  • Target

    2644-73-0x0000000000400000-0x000000000043E000-memory.dmp

  • Size

    248KB

  • MD5

    58cb531f82923818b41e15dd0111c4f3

  • SHA1

    917e0f3bd2ab09446ff5ad7502aa8e155d9aa762

  • SHA256

    24e50bb8a281bab559b9c5161f23c4619b67330126c8c8c50fe60b906cb18712

  • SHA512

    bc8113aab2c9c6e56f5512b07a35836163d72630cd924c315f701524b85676b658f1bbcba5ed762a61d689b0546c44e27e6dc0a5c013f61c4887b40aec1a1ecb

  • SSDEEP

    3072:l5wWp9nNNgcFocfgi6G26G2t/q/WvMXGBJJdPHj7Ee8S:lq49NNgcFvfgitR/LvMXGBxfj7Ee8

Malware Config

Extracted

Family

redline

Botnet

LogsDiller Cloud (TG: @logsdillabot)

C2

146.59.161.13:39199

Signatures

  • RedLine payload 1 IoCs
  • Redline family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2644-73-0x0000000000400000-0x000000000043E000-memory.dmp
    .exe windows:4 windows x86


    Headers

    Sections